TP-Link (BUFFER OVERFLOW VIA A LONG AUTHORIZATION HTTP HEADER) CVE-2018-15172

First, connect to this network:

 

 

new

 

 

Open BurpSuite and then start the intercept, making the necessary proxy changes to the internet browser.

connected admin-min

 

Goto Quick setup >

cookie-min

Now as the Burp is intercept is on, you will find an Authorization: Basic followed by a string. Now we paste a string consisting of 2000 zeros.

2000 zero-min

Then forward the connection>>>>>>>

Then your router automatically log out and the net connection will be gone.

netcut-min

 

Leave a comment

Create a website or blog at WordPress.com

Up ↑

Design a site like this with WordPress.com
Get started